The Proceedings of the Conference on Information Systems Applied Research 2009: §3143    Home    Papers/Indices    prev (§3142)    Next (§3144)
Sat, Nov 7, 8:30 - 8:55, Crystal 4     Paper (refereed)
Recommended Citation: Kim, P S and L J Steen.  Can Management Predict Information Security Threats by Utilizing a Data Warehouse?  In The Proceedings of the Conference on Information Systems Applied Research 2009, v 2 (Washington DC): §3143. ISSN: 0000-0000. (A later version appears in Journal of Information Systems Applied Research 3(15). ISSN: 1946-1836.)
CDpic

Can Management Predict Information Security Threats by Utilizing a Data Warehouse?

thumb
Refereed9 pages
Philip S. Kim    [a1] [a2]
School of Business
Walsh University    [u1] [u2]
North Canton, Ohio, USA    [c1] [c2]

Lee Jonathan Steen    [a1] [a2]
Computer Information Systems
Robert Morris University    [u1] [u2]
Coraopolis, Pennsylvania, USA    [c1] [c2]

In many organizations, management has the responsibility of implementing information security countermeasures to detect, minimize, and defend against information security threats. Most of these countermeasures traditionally adopt a passive approach to securing corporate data. This paper proposes a new theoretical framework for management to utilize an information security data warehouse to identify security breach patterns, in order to predict when potential breaches are most likely to occur, thus taking a more proactive approach to securing information assets.

Keywords: Information Security, Security Management, Predictive Security Model, Security Breaches, Secure Data Warehousing

Read this refereed paper in Adobe Portable Document (PDF) format. (9 pages, 398 K bytes)
Preview this refereed paper in Plain Text (TXT) format. (32 K bytes)

CDpic
Comments and corrections to
webmaster@isedj.org